Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Load Balancing Clustering

By Exforsys | on September 25, 2009 |
Cluster Computing

Every business wants to ensure their online operations such as their e-store or online application for customer service works well anytime of the day. They need to have powerful servers, applications and the right clustering to ensure a fail safe operation for their users.

Clustering pushes the functions of an application to be faster or ensures data availability’s faster transfer. With the right clustering form, online or network (for local use) needs could be easily serviced.

An ideal clustering form to ensure stability is load balancing. Clustering by load balancing is basically a form of connection between computers (referred to as nodes in clustering) wherein the workload is evenly distributed.

Although a single computer could provide the same operations, the hardware capability of a single computer or a node will never be enough to handle massive data requests and processing.

To answer to the constant requests, multiple computers are connected together to harness each processing power. By sharing the workload, the processing time is increased and massive data requests and processes could be possible.

Load balancing is a form of clustering often differentiated with High Availability (HA) clustering. HA Clustering is a form of connection between nodes wherein a primary node is backed up with a number of nodes in case the primary node fails.

Load balancing and HA aims for one thing – stability. Their configuration ensures that the features of an application will always be available or the data will always be there when the customer needs them. HA aims to do that by having multiple back-ups while load balancing ensures stability but getting multiple nodes to work at the same time.

Transfer of Workload

One feature that would make load balancing stand-out is its ability to address failures. Every machine will always reach its toll and the only way to address them is to have a ready solution in case this happens.

In load balancing, the workload of the failed node is immediately redistributed to other nodes. By distributing the workload, efficiency continues since the nodes will only experience relatively small changes.

Workload transfer is done once the node fails as the load balancer connects to the nodes works like a pulse that monitors the performance of each node. With a predetermined interval, the load balancer will check each node and alert the network administrator in case one node fails. Balancers in load balancing cluster have the ability to transfer the workload to other nodes automatically to avoid further delay of operation.

Prevention of DoS Attack

Another feature load balancing brings to businesses is the ability to prevent attack by DoS (denial of service). This type of attack could be done by multiple computers wherein constant and high data requests could easily use up the bandwidth of the website. Through consistent high data requests, the online application will not be able to service the legitimate users. With only a single node through a server answering the computation, DoS could be experienced by legitimate users.

Load balancing should be able to handle this attack without any problem. Consistent and high data requests could be easily handled by multiple nodes as the load balancer evenly distributes data requests from different users. Delay binding could even be implemented by load balancers wherein the requests are not answered together but some are delayed to ensure stability of the functions.

Hardware Requirements

For load balancing to work, additional hardware is required wherein its sole purpose is to continuously monitor nodes and redistribution of workload if one of the nodes fails. Some see this as a disadvantage for load balancing cluster since it will require additional spending just to ensure the nodes will be working well.

But this additional hardware is actually a better configuration especially for businesses who expects massive traffic for their online services and data. With the help of an additional hardware, the nodes could fully focus on ensuring the functions work well or the data will be transferred as soon as possible.

HA clustering on the other hand will require the nodes to constantly monitor the primary node and take over if the primary node fails. Load balancing may cost more compared to HA clustering but the additional hardware will optimize the nodes in this clustering design.

« « Clustering on P2P
Infrastructure Consideration in Clustering » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 394 Followers
  • Popular
  • Recent
  • Two-Node Clusters

    September 30, 2009 - 0 Comment
  • Introduction to Clustering

    September 16, 2009 - 0 Comment
  • Clustering through Server Farms

    October 1, 2009 - 0 Comment
  • Clustering Applications

    September 17, 2009 - 0 Comment
  • Cluster Supercomputer

    October 3, 2009 - 0 Comment
  • Virtual Machine Clustering

    September 20, 2009 - 0 Comment
  • Clusters – Monitoring and Measurement

    September 18, 2009 - 0 Comment
  • GPU Clusters

    September 21, 2009 - 0 Comment
  • Clustering Security

    September 22, 2009 - 0 Comment
  • Clustering on P2P

    September 24, 2009 - 0 Comment
  • Cluster Supercomputer

    October 3, 2009 - 0 Comment
  • Clustering through Server Farms

    October 1, 2009 - 0 Comment
  • Two-Node Clusters

    September 30, 2009 - 0 Comment
  • Compute Clusters and Grid Computing

    September 29, 2009 - 0 Comment
  • High Availability Clustering

    September 28, 2009 - 0 Comment
  • Infrastructure Consideration in Clustering

    September 27, 2009 - 0 Comment
  • Clustering on P2P

    September 24, 2009 - 0 Comment
  • Clustering Security

    September 22, 2009 - 0 Comment
  • GPU Clusters

    September 21, 2009 - 0 Comment
  • Virtual Machine Clustering

    September 20, 2009 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • Cluster Supercomputer
  • Clustering through Server Farms
  • Two-Node Clusters
  • Compute Clusters and Grid Computing
  • High Availability Clustering

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT